General

  • Target

    PO9683.xlsx

  • Size

    369KB

  • Sample

    211021-gsmfwshhb4

  • MD5

    4dc7f582251c5b4e39c264de6762da49

  • SHA1

    e1d9d7b3b07459deae3cdd4e069c017c90a43e5b

  • SHA256

    6a93492f04506bcc6d5f0ab1199766a03e39cc4a4b3e668c3de238b8ce86ce5e

  • SHA512

    ef8fd4e395b5d70dcc3d910c624e1e2c15a0a4912c830ac1dbf8f92c9531efd16d51c8aad9c3358063c2116ccc2660b2a152f133151c033e686e1c18a58f8cf9

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

kqna

C2

http://www.surfsolutions.info/kqna/

Decoy

achyutlifesciences.com

anthemmg.com

netkopat.com

generationgirlnaturals.com

novatel-network.com

craftstockco.com

thevishantiverse.art

elkerfly.com

haerotechs.com

candypalette.com

gregdokes.com

e-commerce.company

gratitudeland.com

companyintelcloud.com

publicyazilim.com

xc6811.com

aracsozluk.com

janesgalant.quest

fraserstephendop.com

ryan.rentals

Targets

    • Target

      PO9683.xlsx

    • Size

      369KB

    • MD5

      4dc7f582251c5b4e39c264de6762da49

    • SHA1

      e1d9d7b3b07459deae3cdd4e069c017c90a43e5b

    • SHA256

      6a93492f04506bcc6d5f0ab1199766a03e39cc4a4b3e668c3de238b8ce86ce5e

    • SHA512

      ef8fd4e395b5d70dcc3d910c624e1e2c15a0a4912c830ac1dbf8f92c9531efd16d51c8aad9c3358063c2116ccc2660b2a152f133151c033e686e1c18a58f8cf9

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks